搜索结果
找到约 110 项符合
sha 的查询结果
按分类筛选
加密解密 A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asyn
A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.
matlab例程 对于信号的奇异性检测
对于信号的奇异性检测,也是一个道理。
% 小波变换用于奇异检测
% 编程人: 沙威(Wei Sha) 安徽大学(Anhui University) ws108@ahu.edu.cn
加密解密 Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种
Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数:
p:L bits长的素数。L是64的倍数,范围是512到1024;
q:p - 1的160bits的素因子;
g:g = h^((p-1)/q) mod p,h满足h < p - 1, h^((p-1)/q) mod p > 1;
x:x < q,x为私 ...
压缩解压 汇聚各种应用密码学密码算法技术源码
汇聚各种应用密码学密码算法技术源码,包括DEC/SHA/RC4/crypt/md5等
加密解密 Java中常用的加密算法应用
Java中常用的加密算法应用,1. MD5加密,常用于加密用户名密码,当用户验证时。2. SHA加密,与MD5相似的用法,只是两者的算法不同。3. RSA加密,RAS加密允许解密。常用于文本内容的加密。
加密解密 delphi实现加密算法 CRC32-Dym.................CRC32算法动态码表实现 CRC32-Static..............CRC32算法静态码表实现 MD
delphi实现加密算法
CRC32-Dym.................CRC32算法动态码表实现
\CRC32-Static..............CRC32算法静态码表实现
\MD5.......................MD5算法示例
\SHA.......................SHA算法示例
\DES.......................DES算法示例
\2DES......................双重DES算法示例
\3DES............. ...
加密解密 the hash function FORK-256,256位的安全散列验证算法
the hash function FORK-256,256位的安全散列验证算法,SHA-256的替代者。
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...